Added Komga OIDC and Calibre-Web LDAP SSO Documentation#4139
Added Komga OIDC and Calibre-Web LDAP SSO Documentation#4139Avsynthe wants to merge 6 commits intogoauthentik:mainfrom
Conversation
Created OIDC SSO settings for Komga Signed-off-by: Avsynthe <102600593+Avsynthe@users.noreply.github.com>
This reverts commit 0acec5a.
Signed-off-by: Avsynthe <102600593+Avsynthe@users.noreply.github.com>
✅ Deploy Preview for authentik ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #4139 +/- ##
=======================================
Coverage 92.82% 92.82%
=======================================
Files 474 474
Lines 23225 23225
=======================================
Hits 21557 21557
Misses 1668 1668
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
BeryJu
left a comment
There was a problem hiding this comment.
Missing a couple minor things, also add the docs to the sidebar here https://github.com/goauthentik/authentik/blob/153bd3aaf1519eef7a7699e8b314b5652dbc8df1/website/sidebarsIntegrations.js
(Also normally it would be preferred to create a PR per service, just for the future)
|
|
||
| The following placeholder will be used: | ||
|
|
||
| - `ldapservice` is the username of the authentik admin user you'd like to use for Calibre-Web to connect. |
There was a problem hiding this comment.
Missing the FQDN of authentik, calibre and the ldap outpost (see https://goauthentik.io/integrations/services/jellyfin/#what-is-jellyfin)
|
|
||
| - `ldapservice` is the username of the authentik admin user you'd like to use for Calibre-Web to connect. | ||
|
|
||
| Create an application for Calibre-Web in authentik and follow the Forward auth documentation here https://goauthentik.io/docs/providers/proxy/forward_auth |
There was a problem hiding this comment.
Missing instructions for the LDAP application
| Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters: | ||
|
|
||
| - Client Type: Confidential | ||
| - Scopes: OpenID, Email and Profile |
There was a problem hiding this comment.
| - Scopes: OpenID, Email and Profile |
These scopes are the default so this is redundant
|
Found this PR while trying to add OAuth2 to Komga, will you fix the minor issues @Avsynthe ? |
|
Edit: This seems to have been getting stuck for me because I also set the "Encryption Key" as well as the "Signing Key". |
Changes
New Features